Impact
The vulnerability stems from the libgphoto2 camera library, specifically the ptp_unpack_Sony_DPD() routine in ptp-pack.c. In versions up to 2.5.33 the function reads a 2‑byte enumeration count without first verifying that the buffer contains two bytes. This unchecked read can expose arbitrary memory contents from the host process that handles camera communication, constituting a classic out-of-bounds read flaw.
Affected Systems
Any installation of libgphoto2 for the gphoto vendor with a version 2.5.33 or earlier is affected. Software that depends on this library and communicates with Sony cameras via the PTP_DPFF_Enumeration content will also be vulnerable. Public releases newer than 2.5.33 contain the fix and are not impacted.
Risk and Exploitability
The CVSS score of 5.2 indicates a medium severity threat. Exploitation would require an attacker to supply crafted PTP commands to the library, typically by interacting with a connected camera device or through a vulnerable camera control application. Because the flaw is an out-of-bounds read rather than a format‑string or privilege‑escalation bug, the risk of arbitrary code execution is low, but the potential to leak sensitive data is present. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, suggesting a moderate but not imminent exploitation risk. The likely attack vector is a local or device-based attack where the attacker can send compromised data to the library.
OpenCVE Enrichment